M02 - Configuring and Administering Server
M02 - Configuring and Administering Server
Level-III
Based on November 2023, Curriculum
Version-II
Nov, 2023
Addis Ababa, Ethiopia
Contents
Page i of 78 Author/Copyright: Version - 1
Ministry of Labor and Skills Configure and Administer Server Level- III November, 2023
Acknowledgment....................................................................................................................................................................iii
Acronym................................................................................................................................................................................. iv
Introduction to the Module......................................................................................................................................................v
Unit one: Confirm server specification...................................................................................................................................1
1.1. Overview of Server Operating System....................................................................................................................2
1.2. Confirming network operating system.....................................................................................................................3
1.3. Identifying product, vendor architecture and equipment.........................................................................................4
1.4. Identifying technology and resource........................................................................................................................5
Self-check test-1.......................................................................................................................................................................7
Unit Two: Verify server compatibility and inter-operability..................................................................................................8
2.1. Reviewing Hardware and software to ensure compatibility.........................................................................................9
2.3. Installing required operating system and software.....................................................................................................12
2.4. Installing additional tools or third-party software.......................................................................................................13
2.5. Patching operating system and applications...............................................................................................................14
Self-check 2............................................................................................................................................................................15
Operation sheet 2.1. Install Server Operating system........................................................................................................16
3.1. Configuring server......................................................................................................................................................34
3.2. Defining scope and applicability of testing.................................................................................................................43
3.3. Developing test plan....................................................................................................................................................44
3.4. Running system test....................................................................................................................................................44
3.5. Analyzing error report and making changes...............................................................................................................44
3.6. Validating changes......................................................................................................................................................45
Self-Test 3.............................................................................................................................................................................. 47
Operation sheet 3: Install DNS Server..................................................................................................................................48
Operation sheet 3.1 Install Active Directory.........................................................................................................................50
Operation sheet 3.3. Configure DHCP server........................................................................................................................60
Operation sheet 3.4: Create users using server 2012............................................................................................................64
Operation sheet 3.5: Create a GPO in domain server 2012...................................................................................................68
LAB Test 3.1 Install Operating System.................................................................................................................................72
Reference............................................................................................................................................................................... 73
Participants of this Module preparation.................................................................................................................................74
Ministry of Labor and Skills wish to extend thanks and appreciation to the many representatives of TVET
instructors and respective industry experts who donated their time and expertise to the development of this
Teaching, Training and Learning Materials (TTLM).
AA Active Directory
DS Directory Service
DNS Domain Name System
TVET Technical and Vocational Education and Training
TTLM Teaching and Training Learning Material
DHCP: Dynamic Host Configuration Protocol
OS: Operating System
LAN : Local Area Network
WAN Wide Area Network
VPN Virtual Private Network
PSTN Public Switched Telephone Network
UTP Unshielded Twisted Pair
STP Shielded Twisted Pair
VLAN Virtual Local Area Network
CLI Command Line Interface
GUI Graphical User Interface
HDD Hard Disk Drive
SSD Solid State Drive
CHKDSK Check Disk
PDA Personal Digital Assistant
IIS Internet Information Services (Microsoft's web server)
CRM Customer Relationship Management
NOS Network Operating System
UNIX A multiuser and multitasking operating system
TCP/IP Transmission Control Protocol/Internet Protocol
GB Gigabyte
RAM Random Access Memory
DVD Digital Versatile Disc
ROM Read-Only Memory
VGA Video Graphics Array
IEEE Institute of Electrical and Electronics Engineers
ISO International Organization for Standardization
VM Virtual Machine
PKI Public Key Infrastructure
CA Certificate Authority
HTTP Hypertext Transfer Protocol
• Do the LAP test in page (if you are ready) and show your output to your teacher.
This unit is developed to provide you the necessary information regarding the following content
coverage and topics:
• Overview of Server Operating System
Software
Network connections.
There are different types of server designs that need to be considered when
identifying equipment.
here are multiple server architectures to choose from, including
Mainframe architecture
File sharing architecture
Client/server architecture
Web based architecture
Thin client architecture
Blade architecture.
Product architecture
It plays a significant role in how to design, make, sell, use, and repair a new product offering .
There are two fundamental types of product architecture: Modular and Integral.
Modular
Organize a product into a number of modules to develop and complete a specific function.
The interaction of these modules carries out the product’s overall purpose.
The advantages of modular include task allocation and outsourcing. As well as, economies of
scale, reuse/standardization for developing new products, maintenance, and mass
customization.
Integral
This Unit is developed to provide you the necessary information regarding the following
content coverage and topics
This guide will also assist you to attain the learning outcome stated in the cover page.
Firstly, confirm that the chosen central processing unit (CPU) aligns with the motherboard
Verify that Random Access Memory (RAM) modules are supported by both the
motherboard and CPU, taking into account factors like RAM type, capacity, and
Additionally, check the compatibility of storage drives, RAID controllers, and networking
Ensure that the power supply unit (PSU) matches the server chassis and motherboard,
providing sufficient power output and appropriate connectors. For graphics processing units
(GPUs), if applicable, confirm compatibility with the motherboard's PCIe slots and check
Matching the server chassis and motherboard form factors is crucial, as well as ensuring
cooling solutions are compatible with both the CPU and chassis.
Lastly, confirm that the chosen operating system is supported, considering driver
availability and compatibility with the server's hardware. Regularly consult manufacturer
Read all the documentation about the products involved. Your hardware or software might
have a recurring problem or might conflict with another product. Frequently, the
manufacturer will document these conflicts and provide a fix. If you do not find the solution
in the supplied documentation, you might contact the manufacturer of the product and ask
for undocumented conflicts.
If you are installing Novell's Intranet Ware, for example, the install utility will automatically
scan your computer for hardware such as hard disks, CD-ROM drives, and NICs. If the
devices are recognized, the appropriate drivers will then be loaded for the recognized devices
Checking Minimum Requirements
As a first step before you install, make sure that you exceed the minimum requirements for
the resources in the computer.
These resources include processor speed, memory, and disk space.
Table lists some minimum hardware requirements for server 2008
Table 1. Minimum Hardware Requirements for window server 2008 operating system
The first step in obtaining a networking device is to put suppliers of that device. Then,
there are factors you need to consider about the supplier and the devices on offer, such as
support provided and purchase price.
This will help you to compare and choose the most appropriate supplier and the exact
model of the device according to client requirements.
Finally, you are ready to place an order for your organization or client to purchase the
device.
Server operating systems are designed for platforms that act as web servers, application
servers, database servers, email servers, or other platforms running on a dedicated server.
Server operating systems offer various benefits compared to standard operating systems,
including unlimited user connections, more memory, and advanced network optimizations
Figure 2.1 on operation sheet 1.1 is the first screen you’ll see. It allows you to customize
the installation language and the regional and keyboard settings of the server. You’ll need
to change some settings here if the defaults do not match your language, region, and
keyboard.
For example, if you are in Ireland using an Irish-based keyboard, then these defaults won’t
suit you at all! The time zone won’t work correctly, currency symbols will be wrong, and the
keyboard layout will be totally wrong. For example, you will struggle to find the backslash
(\), which is kind of important in the Windows world.
1. Hardware and software compatibility is important to ensure smooth and efficient operation of
computer systems.
2. Drivers are a type of software that play a crucial role in facilitating communication between
hardware and the operating system.
3. Upgrading hardware components, such as a graphics card, may require updating corresponding
software drivers to maintain compatibility.
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_________
2. Reboot the
computer.
4. Next,
press Install
Now to begin the
installation
process.
Because you did not provide the correct ID, the installation process cannot determine what kind of
Windows Server 2008 license you own, and therefore you will be prompted to select your correct
version in the next screen, assuming you are telling the truth and will provide the correct ID to prove your
selection later on.
8. Read and accept the license terms by clicking to select the checkbox and pressing Next.
9. In the "Which type of installation do you want?" window, click the only available option –Custom (Advanced).
If you must, you can also click Drive Options and manually create a partition on the destination hard disk.
11. The installation now begins, and you can go and have lunch. Copying the setup files from the DVD to the hard
drive only takes about one minute.
16. In the password changing dialog box, leave the default password blank (duh, read step #15…), and enter a new,
complex, at-least-7-characters-long new password twice. A password like "top secret" is not valid (it's not complex),
but one like "T0pSecreT!" sure is. Make sure you remember it.
17. Finally, the desktop appears and that's it, you're logged on and can begin working.
Step 1: We can download the evaluation ISO of Windows Server 2012 R2 from the following link:
Step 2: After downloading the ISO of Microsoft, create a boot USB driver which can be created with the
Microsoft tool called Windows USB/DVD Download Tool and can be downloaded from the following link:
Step 4: After the files are loaded, you will see the screen of language settings of installation, keyboard, time
and currency format. Generally, all the default ones are also good enough to start with. Click Next.
Step 6: Once you have clicked on Install Now, the setup will start and it will load all the files and
the screen will look as shown in the following screenshot.
Step 8: Click “I accept the license terms” and then click on the Next button as shown in the
following screenshot.
Step 11: Once the reboot is done the following screen will appear. Set the password for the server
and then click on “Finish”.
Step 12: It will take some minutes until the setup finishes completely.
This unit is developed to provide you the necessary information regarding the following content
coverage and topics
• Configuring server
Specifically, upon completion of this Learning Guide, you will be able to:
• Configure server
A DHCP scope also includes some other settings that affect how the devices
communicate on the network, such as the subnet mask, the default gateway,
and the DNS servers.
Each scope is associated with a specific subnet and includes settings such as
lease duration and default gateway.
This means that a DHCP scope is linked to a subset of a larger network,
called a subnet. A subnet is a group of devices that share a common prefix
in their IP addresses. For example, all the devices in the scope 192.168.1.1
to 192.168.1.100 belong to the subnet 192.168.1.0/24, where /24 indicates
the length of the prefix. A DHCP scope also includes settings that
determine how long a device can keep an IP address (lease duration) and
how to reach other networks (default gateway).
the printer and not to any other device. Reservations are useful for devices
that need a fixed IP address for identification or access purposes.
Hyper-V
Hypervisor Technology: Hyper-V is a Type 1 hypervisor, which means it runs
directly on the hardware without a host operating system. This improves the
efficiency and performance of virtualization.
Host Operating System: Hyper-V is available as a feature on Windows Server
editions and Windows 10 Pro, Enterprise, and Education editions. Users can enable
Hyper-V on their Windows-based systems for server or desktop virtualization.
Virtual Machines: Hyper-V allows users to create and run multiple virtual machines
(VMs) on a single physical server. Each VM has its own operating system,
applications, and settings, and is isolated from other VMs.
File Servers: These are servers that host shared files and provide access to clients
over a network, with configuration options for permissions, access control, and file
storage.
Page 39 of 78 Author/Copyright: Version - 1
Ministry of Labor and Skills Configure and Administer Server Level- III November, 2023
File Permissions and Access Control:
These are mechanisms for setting and enforcing rules on who can read, write, or
execute specific files and directories on the network.
Distributed File Systems: These are systems that organize and manage files across
multiple servers or storage devices, providing a unified namespace and a
centralized view of the files.
File Replication: This is the process of duplicating files across multiple servers for
redundancy and fault tolerance, enhancing data availability and resilience.
File Caching: This is the technique of storing frequently accessed files locally,
reducing the need to retrieve them from the server every time they are requested,
and improving file access speed.
File Locking: This is the technique of preventing multiple users from
simultaneously modifying the same file, avoiding data inconsistency and
corruption.
Pint services
Print server, which is a device or software that manages and coordinates print jobs
on a network.
The text explains the main function of a print server, which is to provide a
centralized point for controlling and directing print requests from client devices to
one or more printers.
A print server simplifies the administration and configuration of printers and print
jobs within a network.
Users do not need to install or update printer drivers on their devices, as they can
send print jobs to the print server, which then handles the distribution of print tasks
to the appropriate printers.
A print server can enforce security and access policies for printers and print jobs,
such as authentication, authorization, encryption, quotas, watermarking, etc. A
print server can also monitor and audit the print activity and usage in the network,
and generate reports and statistics.
A print server can improve the performance and reliability of printing by balancing
the network workload and avoiding printer congestion. A print server can also
reduce the cost of printing by optimizing the use of printer resources and
Print Logging and Auditing: Features that track print activities, such as
monitoring printer usage, troubleshooting problems, or generating reports.
Windows server Update Server
WSUS: A Microsoft tool for managing updates for Microsoft products in a
corporate network. It acts as a local update repository and allows administrators to
approve, distribute, and monitor updates.
Update Management: WSUS categorizes updates into different types, such as
security, critical, or service packs. Administrators can configure WSUS to
automatically approve and deploy specific categories of updates to client
computers.
Deployment Rings: WSUS enables administrators to organize computers into
deployment rings, which help in testing updates on a subset of computers before
rolling them out to the entire organization.
Reporting and Monitoring: WSUS provides reporting and monitoring features that
allow administrators to track the status of updates across the network. Reports
include information on update compliance, failed installations, and update history.
Page 41 of 78 Author/Copyright: Version - 1
Ministry of Labor and Skills Configure and Administer Server Level- III November, 2023
Web server(IIS)
Internet Information Services (IIS), a web server software developed by Microsoft.
It explains the following aspects of IIS:
Web Server Functionality: How IIS handles web requests and delivers web
content.
HTTP and HTTPS Protocols: How IIS supports secure and unsecure web
communication using SSL/TLS encryption.
Hosted Content Types: What types of web content IIS can host, including
static
The scope and applicability of testing are critical aspects of the software testing
process that define what will be tested, the objectives of testing, and the boundaries
of the testing effort. Here is an overview of the scope and applicability of testing:
Scope of Testing: The scope of testing outlines the boundaries and extent of the
testing effort. It defines what aspects of the software will be tested and what will not
be tested.
The scope typically includes:
Functional Features: Identify the specific functionalities, features, and use cases
that will be tested. This includes both primary and secondary functions of the
software.
Non-functional Features: Identify the quality attributes, such as performance,
usability, security, and reliability, that will be tested. This includes both
quantitative and qualitative measures of the software.
Test Levels: Identify the different levels of testing, such as unit, integration,
system, and acceptance, that will be performed. This includes the scope and
objectives of each level, as well as the dependencies and interactions between
them.
Test Types: Identify the different types of testing, such as functional, non-functional,
regression, and exploratory, that will be conducted. This includes the scope and
objectives of each type, as well as the techniques and tools used for them.
Test Schedule: The timeline for testing activities, including the start and end dates
for each testing phase, the milestones and the dependencies.
Resource Planning: The allocation of resources for testing, such as the roles and
responsibilities of the test team, the tools and equipment needed, and the budget
and risks involved.
3.4. Running system test
System testing involves several steps, such as setting up the test environment, creating and
executing test cases, reporting and logging defects, performing regression testing, and
retesting. System testing also includes various types of testing, such as performance
testing, load testing, security testing, usability testing, etc.
3.5. Analyzing error report and making changes
Brief description of a general process for analyzing error reports and implementing
changes in software development. It consists of three main steps:
Root cause analysis can help identify the underlying problems in the code, design,
logic, or environment of the software. Examples of root cause analysis methods are
defect reports and error classification.
This step involves implementing solutions to correct or improve the software based
on the root cause analysis.
Changes can include modifying the code, updating the framework, fixing the
configuration, or enhancing the functionality of the software.
Changes should be tested and verified before deployment to ensure they work as
expected and do not introduce new errors.
3.6. Validating changes
Process and purpose of validating changes in a system, product, or process. Here are some
elaborations and additional facts
Validation vs Verification
Validation is different from verification, which is the process of checking whether the
system, product, or process meets the design specifications.
Verification answers the question “Are we building the product right?” while validation
answers the question "Are we building the right product?"
Validation Methods
There are different methods of validation depending on the type and scope of the changes.
Some common methods include testing, inspection, analysis, simulation, demonstration,
and review.
Each method has its own advantages and limitations, and the choice of method depends on
factors such as cost, time, risk, and complexity.
2. ________A web server is a type of server that hosts and delivers web pages to clients using the
HTTP protocol
3. ________A proxy server is a type of server that acts as an intermediary between clients and
other servers, providing security, caching, or filtering functions
4. _________ A mail server is a type of server that handles the sending and receiving of emails
using protocols such as SMTP, POP3, or IMAP
1. What is the main advantage of using a blade server over a tower server?
2. What is the name of the technology that allows multiple operating systems to run on a
single physical server? A. Server clustering B. Server virtualization
3. What is the name of the protocol that allows remote access and management of servers
over a network? A. RDP (Remote Desktop Protocol) B. SSH (Secure Shell) C. SNMP
(Simple Network Management Protocol) D. Telnet Answer: B. SSH (Secure Shell)
4. What is the name of the device that connects multiple servers to a shared storage system,
such as a SAN (Storage Area Network)? A. Switch B. Router C. Hub D. HBA (Host
Bus Adapter)
• Select DNS Server from the list and then click Next button.
• A little introduction to DNS Server and a few useful links for further details as
shown in below image. Click Next to move on.
In here the
server ip is
10.0.0.14. Since
we going to make it as DNS server too you should use the same ip as the preferred DNS server. Next
step is to install the Active directory roles. Unlikely the older version of windows servers Microsoft
highly recommend to use server manager option to install roles before you run dcpromo.
Select the roles from the right hand panel and click on add roles option
From the roles list select the "Active Directory Domain Services" role and Click "Next "
It will take few minutes to complete and when its done you will get this confirmation. And then click
on "Close"
Since we going to install New Domain Controller in new forest please select the option "Create
a new domain in new forest" option and click on "Next"
In this window it will ask to select forest function level. If you going to add server 2003 domain
controller to your forest later don't select the function level as server 2008. If you going to use full
features of 2008 Ad you must select forest function level as server 2008. In my case I used server 2008.
Click on "Next" after the select.
If the wizard cannot create a delegation for the DNS server, it displays a message to indicate that you can
create the delegation manually. To continue, click "Yes"
In next window its asking to define a restore mode password. Its more important if you had to
do a restore from backup in a server crash. Click on "Next" after filling it.
Then it will start the installation of the AD. It will take some time to complete. After complete of the
installation perform a server reboot.
4 Click Next
8 Do not add any scopes for now. You can obviously add or import scopes later, when the
clustered DHCP server service has been created.
11 Click Install, and then click Close. Repeat the same procedure on the second node of the
cluster.
Open Server Manager and click Tools > Active Directory Users and Computers.
Review the details you specified and click Finish to create the user in Active Directory.
As the GPMC opens up, you will see the tree hierarchy of the domain. Now expand the
domain, firewall. Local in our case, and you will see the FW Users OU which is where our users
reside. From here, right-click this OU and select the first option Create a GPO in this domain and
Link it here:
Next, right-
click the GPO object and click edit:
First we need to activate the policy by selecting the Enabled. When ready click Apply and then Ok
As we can see below, our user's desktop now has the background image configured in the group policy we created
1. Pakuwal, Bivek. “Graphical User Interface.” LinkedIn SlideShare, 17 Apr. 2015, Available
2. “Command-Line Interface.” Wikipedia, Wikimedia Foundation, 16 July 2018, Available here.
3. Windows Server 2019 Administration Inside Out:
4. Learn Windows PowerShell in a Month of Lunches
5. Linux Bible:
6. Ubuntu Unleashed 2023 Edition.
7. CompTIA Server+ Study Guide: Exam SK0-004
8. Red Hat RHCSA/RHCE 7 Cert Guide: Red Hat Enterprise Linux 7: A
9. Mastering Windows Server 2016
10. Pro Linux System Administration
Organization/
No Name Qualification Field of Study Mobile number E-mail
Institution